<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.3.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-sha1-05" category="std" consensus="true" submissionType="IETF" updates="4034, 5155" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with SHA-1">Deprecating the use of SHA-1 in DNSSEC signature algorithms</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="April" day="03"/>

    
    
    

    <abstract>


<?line 53?>

<t>This document deprecates the use of the RSASHA1 and RSASHA1-NSEC3-SHA1
algorithms for the creation of DNSKEY and RRSIG records.</t>

<t>It updates RFC4034 and RFC5155 as it deprecates the use of these algorithms.</t>



    </abstract>



  </front>

  <middle>


<?line 60?>

<section anchor="introduction"><name>Introduction</name>

<t>The security of the SHA-1 algorithm <xref target="RFC3174"/> has been slowly diminishing
over time as various forms of attacks have weakened its cryptographic
underpinning.  DNSSEC <xref target="RFC9364"/> originally <xref target="RFC3110"/> made extensive use
of SHA-1 as a
cryptographic hash algorithm in RRSIG and Delegation Signer (DS)
records, for example.  Since then, multiple other algorithms with
stronger cryptographic strength are now widely available for DS records (such
as SHA-256 <xref target="RFC4509"/>, SHA-384 (<xref target="RFC6605"/>)) and for DNSKEY and RRSIG records
(such as RSASHA256 (<xref target="RFC5702"/>), RSASHA512 (<xref target="RFC5702"/>), ECDSAP256SHA256
<xref target="RFC6605"/>, ECDSAP384SHA384 <xref target="RFC6605"/>, ED25519 <xref target="RFC8080"/>, and ED448
<xref target="RFC8080"/>). Further, support for validating SHA-1 based signatures has been
removed from some systems. As a result, SHA-1 is no longer fully interoperable
in the context of DNSSEC. As adequate alternatives exist, the use of SHA-1 is
no longer advisable.</t>

<t>This document thus further deprecates the use of RSASHA1 and
RSASHA1-NSEC3-SHA1 for DNS Security Algorithms.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-rsasha1-and-rsasha1-nsec3-sha1-algorithms-in-dnssec"><name>Deprecating RSASHA1 and RSASHA1-NSEC3-SHA1 algorithms in DNSSEC</name>

<t>The RSASHA1 <xref target="RFC4034"/> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"/> algorithms
MUST NOT be used when creating DNSKEY and RRSIG records.</t>

<t>Validating resolver implementations MUST continue to support
validation using these algorithms as they are diminishing in use but
still actively in use for some domains as of this publication.
Because of RSASHA1 and RSASHA1-NSEC3-SHA1's non-zero use, deployed
validating resolvers MAY be configured to continue to validate RRSIG
records that use these algorithms.  Validating resolvers deployed in
more security strict environments MAY wish to treat these RRSIG
records as an unsupported algorithm.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1
signatures since they are no longer considered to be secure.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of SHA-1 based algorithms should
immediately switch to algorithms with stronger cryptographic algorithms,
such as those listed in the introduction.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "Use for DNSSEC Delegation" field of the
"Digest Algorithms" registry <xref target="DS-IANA"/> for SHA-1 (1) to MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Signing" column of the
DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/> to MUST NOT
for the RSASHA1 (5) and RSASHA1-NSEC3-SHA1 (7) algorithms.</t>

<t>All other columns should remain as currently specified.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3110">
  <front>
    <title>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="May" year="2001"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA1 SIG resource records (RRs) in Section 3 and, so as to completely replace RFC 2537, describes how to produce RSA KEY RRs in Section 2. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3110"/>
  <seriesInfo name="DOI" value="10.17487/RFC3110"/>
</reference>
<reference anchor="RFC3174">
  <front>
    <title>US Secure Hash Algorithm 1 (SHA1)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="P. Jones" initials="P." surname="Jones"/>
    <date month="September" year="2001"/>
    <abstract>
      <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3174"/>
  <seriesInfo name="DOI" value="10.17487/RFC3174"/>
</reference>
<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>
<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>
<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>
<reference anchor="RFC4509">
  <front>
    <title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="May" year="2006"/>
    <abstract>
      <t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs). DS records, when stored in a parent zone, point to DNSKEYs in a child zone. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4509"/>
  <seriesInfo name="DOI" value="10.17487/RFC4509"/>
</reference>
<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>
<reference anchor="RFC5702">
  <front>
    <title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="J. Jansen" initials="J." surname="Jansen"/>
    <date month="October" year="2009"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035). [STANDARDS TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5702"/>
  <seriesInfo name="DOI" value="10.17487/RFC5702"/>
</reference>
<reference anchor="RFC6605">
  <front>
    <title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="W.C.A. Wijngaards" initials="W.C.A." surname="Wijngaards"/>
    <date month="April" year="2012"/>
    <abstract>
      <t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC). It lists curves of different sizes and uses the SHA-2 family of hashes for signatures. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6605"/>
  <seriesInfo name="DOI" value="10.17487/RFC6605"/>
</reference>
<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>


<?line 126?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following
IETF participants in helping produce this document: Mark Andrews,
Steve Crocker, Peter Dickson, Paul Hoffman, Russ Housley, Shumon
Huque, Barry Leiba, S Moonesamy, Yoav Nir, Florian Obser, Peter
Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski, and the many
members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

